咨询与建议

限定检索结果

文献类型

  • 375 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 381 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 332 篇 工学
    • 324 篇 计算机科学与技术...
    • 146 篇 软件工程
    • 72 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 14 篇 电气工程
    • 9 篇 安全科学与工程
    • 3 篇 机械工程
    • 3 篇 交通运输工程
    • 3 篇 生物工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 光学工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
  • 35 篇 管理学
    • 28 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 3 篇 工商管理
  • 18 篇 理学
    • 15 篇 数学
    • 5 篇 统计学(可授理学、...
    • 3 篇 生物学
  • 9 篇 法学
    • 9 篇 社会学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 138 篇 access control
  • 15 篇 rbac
  • 14 篇 privacy
  • 14 篇 authorization
  • 12 篇 security
  • 11 篇 attribute-based ...
  • 10 篇 relationship-bas...
  • 9 篇 xacml
  • 9 篇 usage control
  • 8 篇 internet of thin...
  • 8 篇 role-based acces...
  • 8 篇 control system a...
  • 7 篇 abac
  • 6 篇 policy mining
  • 5 篇 attributes
  • 4 篇 xml
  • 4 篇 information flow...
  • 4 篇 policy enforceme...
  • 4 篇 activity-centric...
  • 4 篇 access control m...

机构

  • 7 篇 purdue univ w la...
  • 5 篇 suny stony brook...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 purdue univ dept...
  • 3 篇 univ waterloo wa...
  • 3 篇 department of co...
  • 3 篇 univ kent sch co...
  • 3 篇 swiss fed inst t...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 iit kharagpur kh...
  • 2 篇 univ trento dept...
  • 2 篇 univ. of texas d...
  • 2 篇 peking univ peop...

作者

  • 16 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 11 篇 ahn gail-joon
  • 10 篇 lobo jorge
  • 8 篇 li ninghui
  • 7 篇 crampton jason
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 vaidya jaideep
  • 6 篇 hu hongxin
  • 6 篇 tripunitara mahe...
  • 6 篇 stoller scott d.
  • 6 篇 iyer padmavathi
  • 5 篇 gupta maanak
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 molloy ian
  • 5 篇 kerschbaum flori...
  • 5 篇 ranise silvio
  • 5 篇 armando alessand...

语言

  • 379 篇 英文
  • 1 篇 葡萄牙文
  • 1 篇 其他
检索条件"任意字段=Proceedings of the 17th ACM symposium on Access Control Models and Technologies"
381 条 记 录,以下是81-90 订阅
排序:
SCIFFS: Enabling Secure third-Party Security Analytics using Serverless Computing  21
SCIFFS: Enabling Secure Third-Party Security Analytics using...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Polinsky, Isaac Datta, Pubali Bates, Adam Enck, William N Carolina State Univ Raleigh NC 27695 USA Univ Illinois Champaign IL USA
third-party security analytics allow companies to outsource threat monitoring tasks to teams of experts and avoid the costs of in-house security operations centers. By analyzing telemetry data from many clients these ... 详细信息
来源: 评论
Information System applied in Construction Quality control: A Mapping Study  2021
Information System applied in Construction Quality Control: ...
收藏 引用
17th Brazilian symposium on Information Systems: Intelligent and Ubiquitous Information Systems: New Challenges and Opportunities, SBSI 2021
作者: Souza, Leander De Barros Junior, Giuseppe Miceli Choren, Ricardo Instituto Militar de Engenharia RJ Rio de Janeiro Brazil
Civil construction has increasingly invested in techniques for quality assurance and control. Service inspection is a key activity in the quality control process and executed by specialized professionals in order to r... 详细信息
来源: 评论
Declarative access control for Aggregations of Multiple Ownership Data  20
Declarative Access Control for Aggregations of Multiple Owne...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Rosa, Marco Di Cerbo, Francesco Lozoya, Rocio Cabrera SAP Secur Res Sophia Antipolis France Univ Bergamo Sophia Antipolis France
Data aggregation operations are popular in domains like data analytics, machine learning and artificial intelligence. However, despite the availability of information, situations like fragmented ownership and legal fr... 详细信息
来源: 评论
Deploying access control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP theorem  20
Deploying Access Control Enforcement for IoT in the Cloud-Ed...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Ahmad, Tahir Morelli, Umberto Ranise, Silvio FBK ICT Secur & Trust Unit Trento Italy Univ Genoa DIBRIS Genoa Italy
the CAP theorem is used by distributed system practitioners to investigate the necessary trade-offs in the design and development of distributed systems, mainly databases and web applications. In this paper, we use it... 详细信息
来源: 评论
Active Learning of Relationship-Based access control Policies  20
Active Learning of Relationship-Based Access Control Policie...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Iyer, Padmavathi Masoumzadeh, Amirreza SUNY Albany Albany NY 12222 USA
Understanding access control policies is essential in understanding the security behavior of systems. However, often times, a complete and accurate specification of the enforced access control policy in a system is no... 详细信息
来源: 评论
Integrated control Addressing Circuits for a Surface Code Quantum Computer in Silicon  22
Integrated Control Addressing Circuits for a Surface Code Qu...
收藏 引用
proceedings of the 17th acm International symposium on Nanoscale Architectures
作者: Rubaya Absar Zach D. Merino Hazem Elgabra Xuesong Chen Jonathan Baugh Lan Wei Electrical and Computer Engineering University of Waterloo Waterloo Ontario Canada Institute for quantum computing University of Waterloo Waterloo Ontario Canada
Quantum computers require a coordinated operation on a large number of quantum bits (qubits), presenting considerable obstacles such as system integration on a large scale, individual qubits control with precision, an... 详细信息
来源: 评论
Accept - Maybe - Decline: Introducing Partial Consent for the Permission-based access control Model of Android  20
Accept - Maybe - Decline: Introducing Partial Consent for th...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Momen, Nurul Bock, Sven Fritsch, Lothar Karlstad Univ Karlstad Sweden Tech Univ Berlin Berlin Germany
the consent to personal data sharing is an integral part of modern access control models on smart devices. this paper examines the possibility of registering conditional consent which could potentially increase trust ... 详细信息
来源: 评论
A Decision Tree Learning Approach for Mining Relationship-Based access control Policies  20
A Decision Tree Learning Approach for Mining Relationship-Ba...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Bui, thang Stoller, Scott D. SUNY Stony Brook Stony Brook NY 11794 USA
Relationship-based access control (ReBAC) provides a high level of expressiveness and flexibility that promotes security and information sharing, by allowing policies to be expressed in terms of chains of relationship... 详细信息
来源: 评论
AQUA: An Efficient Solver for the User Authorization Query Problem  20
AQUA: An Efficient Solver for the User Authorization Query P...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Armando, Alessandro Gazzarata, Giorgia A. Turkmen, Fatih Univ Genoa DIBRIS Genoa Italy Univ Groningen Groningen Netherlands
We present AQUA, a solver for the User Authorization Query (UAQ) problem in Role-Based access control (RBAC). the UAQ problem amounts to determining a set of roles granting a given set of permissions, satisfying a col... 详细信息
来源: 评论
Matrix Decomposition: Analysis of an access control Approach on Transaction-based DAGs without Finality  20
Matrix Decomposition: Analysis of an Access Control Approach...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Jacob, Florian Becker, Luca Grashoefer, Jan Hartenstein, Hannes Karlsruhe Inst Technol Inst Telemat Karlsruhe Germany
the Matrix message-oriented middleware(1) is gaining momentum as a basis for a decentralized, secure messaging system as shown, for example, by its deployment within the French government and by the Mozilla foundation... 详细信息
来源: 评论